Skip to main content

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8437))

Included in the following conference series:

  • 5652 Accesses

Abstract

In some scenarios, especially when visual cryptography [1] is used, the attacker has no access to an encryption oracle, and thus is not able to mount chosen-plaintext attacks. Based on the notion of real-or-random security under chosen-plaintext attacks (ROR-CPA) given by Bellare et al. [2], we propose the notion of sample-or-random security under ciphertext-only attacks (SOR-CO). We prove that the notion of SOR-CO is fundamentally weaker than the notion of ROR-CPA security and demonstrate the usefulness of our notion by applying it to segment-based visual cryptography [3]. An additional contribution of this paper is the construction of a new segment-based visual encryption scheme with noise based on work by Doberitz [4]. To our knowledge, this is the first visual encryption scheme which makes use of noise. We conjecture that it is secure in the sense of SOR-CO security if the key is not used too often and if the encryption schemes security parameters are chosen accordingly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Google Scholar 

  2. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), pp. 394–403 (1997)

    Google Scholar 

  3. Borchert, B.: Segment-based visual cryptography. Technical report, WSI-2007-04, Wilhelm-Schickard-Institut für Informatik, Tübingen (2007)

    Google Scholar 

  4. Doberitz, D.: Visual cryptography protocols and their deployment against malware. Master’s thesis, Ruhr-Universität Bochum, Germany (2008)

    Google Scholar 

  5. Unucheck, R.: The most sophisticated Android trojan, June 2013. https://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan. Accessed 10 June 2013

  6. Naor, M., Shamir, A.: Visual cryptography ii: improving the contrast via the cover base. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 197–202. Springer, Heidelberg (1997)

    Google Scholar 

  7. Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)

    Google Scholar 

  8. Greveler, U.: VTANs - eine Anwendung visueller Kryptographie in der Online-Sicherheit. In: Koschke, R., Herzog, O., Rödiger, K.-H., Ronthaler, M. (eds.) GI Jahrestagung (2). LNI, vol. 110, pp. 210–214. GI (2007)

    Google Scholar 

  9. Pape, S.: The challenge of authentication in insecure environments. Ph.D. thesis, Universität Kassel (2013) (defended, 2 September 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sebastian Pape .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 International Financial Cryptography Association

About this paper

Cite this paper

Pape, S. (2014). Sample or Random Security – A Security Model for Segment-Based Visual Cryptography. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45472-5_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45471-8

  • Online ISBN: 978-3-662-45472-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics